Research Article Open Access

Features of the Security System Development of a Computer Telecommunication Network

Leonid Chervyakov1, Tagirbek Aslanov1, Dmitry Polezhaev1 and Viktor Lysenko1
  • 1 World-Class Scientific Center “Digital Biodesign and Personalized Healthcare”, Institute for Design-Technological Informatics RAS, Moscow, Russia

Abstract

Global computer networks have enabled ordinary users, companies, organizations and medical institutions to gain virtually unlimited access to data arrays. Therefore, developing systems capable of ensuring the good performance and secure operation of a standard Computer Telecommunication Network (CTN) has become one of the most pressing tasks demanded in the medical industry. Consequently, this study aims to create an ordered chain of operations that can perform information encryption to enhance data transmission and exchange security. This study examines the existing ordered chains of encryption operations and assesses their strengths and weaknesses. In addition, a framework for implementing cryptographic algorithms is proposed. This algorithm structure enables verification of the existence of the correct key along the specified path, thereby enhancing the overall security of the system. The study results indicate that the optimal variant of encryption is the ordered chains of encoding operations that rely on cryptography. The results of the testing demonstrated that the developed ordered chain of operations exhibited several advantages compared to its analogs, with an efficiency that exceeded that of the analogs by more than fourfold. The implementation of the proposed ordered chain of operations would provide a significantly safer operation of a standard CTN in a typical Medical Institution (MI).

Journal of Computer Science
Volume 20 No. 9, 2024, 986-996

DOI: https://doi.org/10.3844/jcssp.2024.986.996

Submitted On: 12 March 2024 Published On: 20 June 2024

How to Cite: Chervyakov, L., Aslanov, T., Polezhaev, D. & Lysenko, V. (2024). Features of the Security System Development of a Computer Telecommunication Network. Journal of Computer Science, 20(9), 986-996. https://doi.org/10.3844/jcssp.2024.986.996

  • 1,096 Views
  • 494 Downloads
  • 0 Citations

Download

Keywords

  • Code
  • Computer Telecommunication Network (CTN)
  • Information Security (IS)
  • Encoding
  • Ordered Chain of Operations